General

  • Target

    nshkmpsl.elf

  • Size

    95KB

  • Sample

    241221-qxzrfszrdv

  • MD5

    0bdf628b8440886203e1f45d3682130a

  • SHA1

    40186d96c2a3be219eb0915a0dd7c9802288f1bf

  • SHA256

    252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883

  • SHA512

    b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28

  • SSDEEP

    1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      nshkmpsl.elf

    • Size

      95KB

    • MD5

      0bdf628b8440886203e1f45d3682130a

    • SHA1

      40186d96c2a3be219eb0915a0dd7c9802288f1bf

    • SHA256

      252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883

    • SHA512

      b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28

    • SSDEEP

      1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd

    Score
    9/10
    • Contacts a large (231774) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks